πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
⚠ Serious XSS flaw discovered in Evernote for Windows, update now! ⚠

Online-note-sharing company Evernote has patched a hole that allowed attackers to infect notes shared via its service.

πŸ“– Read

via "Naked Security".
⚠ Voting machine manual tells officials to reuse weak passwords ⚠

The manual turns good advice on its head, telling officials to use, reuse and recycle weak passwords.

πŸ“– Read

via "Naked Security".
πŸ” Top 20 application vulnerabilities in the enterprise are dominated by Adobe and Microsoft πŸ”

Among the 20 application vulnerabilities, half were for Adobe Flash and 20% were by Microsoft Office.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Why you should use a password manager πŸ”

Jack Wallen discusses why everyone should use a password manager.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 20 Cybersecurity Firms to Watch πŸ•΄

A look at some of the more interesting investments, acquisitions, and strategic moves in the security sector over the past year.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ 5 Reasons Why Threat Intelligence Doesn't Work πŸ•΄

Cybersecurity folks often struggle to get threat intelligence's benefits. Fortunately, there are ways to overcome these problems.

πŸ“– Read

via "Dark Reading: ".
πŸ” Consumers are more concerned with cybersecurity and data privacy in 2018 πŸ”

The majority of users would stop interacting with a brand after a breach.

πŸ“– Read

via "Security on TechRepublic".
❌ Rapidly Growing Router Botnet Takes Advantage of 5-Year-Old Flaw ❌

A sophisticated proxy code has infected hundreds of thousands of devices already.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ WordPress Flaw Opens Millions of WooCommerce Shops to Takeover ❌

A file delete vulnerability in WordPress can be elevated into a remote code execution vulnerability for plugins like WooCommerce.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ Utah Hacker Pleads Guilty to DoS Attacks: DoJ πŸ•΄

Online gaming companies, including Sony Online Entertainment, and servers were main targets.

πŸ“– Read

via "Dark Reading: ".
🕳 November Event Spotlight: CISO / CPO GDPR Summits, GDPR Workshops, 43rd Annual IP Institute, GBI CIO Event, Data Protection World Forum, EDAA Summit, IAPP Europe Data Protection Congress, Privacy Insight Series Webinar 🕳

<code>Media</code><code>CISO / CPO GDPR Summits
November
Seattle</code><code>The GDPR fundamentally changed the data privacy landscape, but that was clearly just the beginning.?The recently approved California Consumer Privacy Act firmly plants similar rights in the US market, and other global regulations demonstrate that we are in a new era of data privacy.? It’s time for a paradigm shift in our approach to data ownership and rights.</code><code>This series is part of a special education / networking series in which TrustrArc is partnering with Intel, Microsoft, BDO, and GDPR Edge to bring to 20 locations across the US and EU.  The Summits will bring together a wide range of expertise and industry perspectives from practitioners, the participating partners, and other special guests to discuss emerging trends on data privacy management.</code><code>>Reserve your seat to a November CISO / CPO GDPR Summit today</code><code>_____________________________________________________________________________</code><code>GDPR Privacy Management Workshops
November
Boston, Washington DC, Seattle & New York</code><code>The TrustArc Privacy Workshops are designed to help businesses achieve, demonstrate, and manage ongoing compliance for the EU GDPR and other regulations and frameworks, including Privacy Shield and CCPA. The free workshops provide informative guidance, peer discussions, and practical solutions on how to operationalize privacy program management along with examples of how companies are using privacy technology tools to help automate compliance.</code><code>The U.S. Department of Commerce will be joining as presenters for Workshops in Boston, Washington DC and New York.</code><code>Topics to be covered in the workshops include: Data Mapping, Records of Processing, DPIA / PIA Management, International Data Transfer, Individual Rights / Data Subjects Access Rights Management, Consent Management, and Compliance Reporting.
</code><code>>Request a seat here</code><code>_____________________________________________________________________________</code><code>43rd Annual IP Institute: Creativity and Innovation in the Arts and Sciences
November 7 – November 9
San Jose, CA</code><code>This year’s multi-day IP Institute celebrates the diversity of IP in our lives and culture by offering outstanding educational programming as well as multiple fun networking events.  This year’s Institute provides a wide range of speakers and presentations on patent, copyright, trademark, trade secret, internet and privacy, cybercrime, technology transfer, licensing, music and entertainment, IP specific ethics, and more.</code><code>TrustArc Senior Counsel Darren Abernethy will be speaking on β€œGDPR: Lessons Learned From the Front Line” on Thursday, November 8th at 10:05am.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>GBI CIO Event
November 15
London</code><code>The CIO Event brings together technology leaders from across the public, large enterprises & mid-market sectors and will provide you with a strategic and practical toolkit to help drive transformation including CIO’s discussing the latest industry trends, workshops, panel discussions & Round table sessions led by visionaries within technology, first-hand case studies on the challenges facing IT andantastic networking opportunities with peers throughout the day.</code><code>TrustArc & GDPR Edge are sponsors and will be speaking at this event.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>Data Protection World Forum
November 20 – November 21
London</code><code>In an increasingly digital economy the…
πŸ•΄ Why Password Management and Company Security Strategies Fall Short πŸ•΄

Researchers say companies need to rethink their password training and take a more holistic approach to security.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to enable SSL and TLS 1.3 on NGINX πŸ”

Jack Wallen walks you through the steps for enabling SSL and TLS 1.3 on your NGINX websites.

πŸ“– Read

via "Security on TechRepublic".
❌ Program Looks to Tap Military Vets for Cyber-Jobs ❌

The training and job-matching effort is a public-private partnership to address a growing workforce gap.

πŸ“– Read

via "The first stop for security news | Threatpost ".
❌ Program Looks to Tap Military Vets for Cyber-Jobs ❌

The training and job-matching effort is a public-private partnership to address a growing workforce gap.

πŸ“– Read

via "The first stop for security news | Threatpost ".
πŸ•΄ IT-to-OT Solutions That Can Bolster Security in the IIoT πŸ•΄

Industrial companies can use the hard-won, long-fought lessons of IT to leapfrog to an advanced state of Industrial Internet of Things security.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to make good business decisions about the spectrum of cyberthreats πŸ”

Ray Rothrock, CEO of cyber-defense firm RedSeal, explains how to weigh each threat and respond appropriately.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ Checkmarx Acquires Custodela πŸ•΄

The purchase adds DevSecOps capabilities to a software license compliance platform.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Crytpocurrency Exchange Targeted Via Attack on Web Traffic Analysis Firm πŸ•΄

"Island-hopping" attackers breached StatCounter so they could get to users of gate.io.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Finding Gold in the Threat Intelligence Rush πŸ•΄

Researchers sift through millions of threat intel observations to determine where to best find valuable threat data.

πŸ“– Read

via "Dark Reading: ".